Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

This article investigates the extended dissipative finite-time boundedness (ED-FTB) problem for fuzzy switched systems under deception attacks. To improve the network resource efficiency, a multidomain probabilistic event-triggered mechanism (MDPETM) is proposed. The mode mismatched phenomenon is modeled based on the switching delay information between the controller mode and the system mode. To extract the true signal generated by the MDPETM, a virtual delay concept is developed. The constraint that the controller and the system must have the same premise variables is removed. Based on the MDPETM, mismatched fuzzy state feedback controllers are first devised which may not share the same modes with the system. Then, by establishing fuzzy basis and controller mode-dependent Lyapunov functionals, sufficient criteria free of nonlinear terms existing in the literature are derived, which ensure the ED-FTB of the closed-loop system under admissible delays and deception attacks. Finally, an application-oriented one-link robotic arm system is utilized to validate the theoretical results.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2024.3365608DOI Listing

Publication Analysis

Top Keywords

deception attacks
12
extended dissipative
8
fuzzy switched
8
switched systems
8
system
5
event-triggered extended
4
dissipative ftb
4
ftb t-s
4
fuzzy
4
t-s fuzzy
4

Similar Publications

Traditional machine learning (ML) relies on a centralized architecture, which makes it unsuitable for applications where data privacy is critical. Federated Learning (FL) addresses this issue by allowing multiple parties to collaboratively train models without sharing their raw data. However, FL is susceptible to data and model poisoning attacks that can severely disrupt the learning process.

View Article and Find Full Text PDF

This article explores the distributed leader-following full-state consensus control problem for feedforward nonlinear stochastic MAS with actuator deception attacks under a fixed directed topology. Unlike the existing works, we establish a novel actuator deception attack model, the attacks have higher stealthiness in model. The false injection information of the attack is generated by a stochastic inverse dynamics system satisfying the stochastic input-to-state stable condition, and the input of the system depends on the relevant output information of neighboring agents, rather than all state information.

View Article and Find Full Text PDF

Importance: Artificial Intelligence-driven analysis of laparoscopic video holds potential to increase the safety and precision of minimally invasive surgery. Vision-language models are particularly promising for video-based surgical decision support due to their capabilities to comprehend complex temporospatial (video) data. However, the same multimodal interfaces that enable such capabilities also introduce new vulnerabilities to manipulations through embedded deceptive text or images (prompt injection attacks).

View Article and Find Full Text PDF

This article presents a comprehensive theoretical framework for addressing the problem of secure fusion estimation in energy-constrained multisensor systems, specifically targeting hybrid attacks in multiple transmission levels. The lifespan of sensor nodes is constrained by the availability of energy supply, and all the sensors have the flexibility to choose between high-energy or low-energy levels for transmitting their measurements. Sensor data becomes vulnerable to malicious tampering when operating in a low-energy level, whereas the high-energy transmission level enables accurate data transmission.

View Article and Find Full Text PDF

This paper proposes a new deep learning and machine learning model for detecting deception and suppression jamming in Ublox-M8T receivers operating under GNSS interference. This solution employs XGBoost for real-time classification of jamming signals, implemented on an STM32H743 microcontroller to ensure ultra-low latency, making it suitable for navigation in various environments. This work's key contribution is integrating a windowing mechanism for pre-saturation alerts and early activation of jamming detection which enhances system reliability by distinguishing between high-credibility and low-credibility GNSS data under static and dynamic jamming conditions.

View Article and Find Full Text PDF